Cryptography- The Core of Confidentiality

Have you read the novels “The case of the dancing men” by Sir Arthur Conan Doyle and “The Gold-bug” by Edgar Allen Poe? If not, please do so! Not only is reading good for your mind, but these two books will also give you a glimpse into the mind of a hacker. The hackers here are the protagonists of the …

Continue Reading
The image displays the two aspects of security, the virtual security vs real security

The heart of security in the virtual (and the real) world!

The world of information security revolves around three core pillars – Confidentiality, Integrity and Availability. This is known as the CIA triad. In simple words: Confidentiality is – “Who should know what and when”Integrity is – “Who can change what and when”, andAvailability is – “Who should get what and when”. This is clear in the context of cybersecurity. Take …

Continue Reading